Solution : https://service.sap.com/sap/support/notes/1298433 (SAP Service marketplace login required)
Summary :
The SAP gateway vulnerability arises due to a kernel bug, leading to possible bypass of reginfo and secinfo settings, allowing unauthorized program communications. Affecting all kernel releases, a temporary gateway modification inconveniently restricted valid program registrations via SAProuter. To permanently resolve this, apply the latest kernel patch, set the gw/reg_no_coon_info parameter, and utilize secure connections through SNC-secured SAProuters or VPN tunnels. Firewall protection and monitoring via transaction SMGW are recommended as additional safeguards. Ensure correct parameter management, as advised in Note 1444282.
Key words :
downloading kernel releases 31i-45b, kernel releases 31i-45b, access control list, secure network communication, wide area network, virtual private network, parametergw/reg_no_conn_infoto activate, mainstream/extended maintenance, function module th_change_parameter, gw/sec_info reason
Related Notes :
1529849 | Gateway security setting in an SCS instance, AS Java |
1465129 | CANCEL registered programs |
1444282 | gw/reg_no_conn_info settings |
1434117 | Bypassing sec_info without reg_info |
1394093 | Collective Security Note |
1391655 | Authorized access to SAPFTP |
1391464 | Authorized access to SAPHTTP |
1305851 | Overview note: reg_info and sec_info |
1294105 | Core in gateway |
1280641 | reginfo, secinfo: Changing #VERSION=2 does not work |
1105897 | GW: reginfo and secinfo with permit and deny ACL |
1069911 | GW: Changes to the ACL list of the gateway (reginfo) |
888889 | Automatic checks for security notes using RSECNOTE |